OWASP Top Ten Proactive Controls 2018 C9: Implement Security Logging and Monitoring OWASP Foundation
However, these applications also commonly contain exploitable vulnerabilities, often due to a lack of awareness of these vulnerabilities and security best practices for avoiding them. Identification and authentication failures occur when an application relies upon weak authentication processes or fails